Access Restriction Bypass Affecting pusher/pusher-php-server package, versions <2.2.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-PUSHERPUSHERPHPSERVER-70129
  • published13 May 2015
  • disclosed13 May 2015
  • creditEgor Homakov

Introduced: 13 May 2015

CVE NOT AVAILABLE CWE-284  (opens in a new tab)

How to fix?

Upgrade pusher/pusher-php-server to version 2.2.1 or higher.

Overview

Affected versions of pusher/pusher-php-server are vulnerable to Exploit in the private channel authentication.

pusher provides private channels with an authentication mechanism meant to restrict who can subscribe to these channels. End-users request a token from a special authentication endpoint, in order to join a particular channel. Due to a lack of validation in the authentication endpoint, a malicious end-user could submit a malformed socket_id field and have the customer unknowingly sign a string which grants access to the private channel even though the end-user appears to be requesting access to different private channel. In this way, a malicious end-user with permission to subscribe to one private channel is able to fake permission for any private channel owned by the same customer.

References

CVSS Base Scores

version 3.1